CVE-2022-49743
ovl: Use "buf" flexible array for memcpy() destination
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ovl: Use "buf" flexible array for memcpy() destination The "buf" flexible array needs to be the memcpy() destination to avoid false positive run-time warning from the recent FORTIFY_SOURCE hardening: memcpy: detected field-spanning write (size 93) of single field "&fh->fb" at fs/overlayfs/export.c:799 (size 21)
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Mar 27, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
cbe7fba8edfc8cb8e621599e376f8ac5c224fa72 < 012cdef22000f3104e4fa8224ad29fde509b8caf cbe7fba8edfc8cb8e621599e376f8ac5c224fa72 < a77141a06367825d639ac51b04703d551163e36c cbe7fba8edfc8cb8e621599e376f8ac5c224fa72 < 07a96977b2f462337a9121302de64277b8747ab1 cbe7fba8edfc8cb8e621599e376f8ac5c224fa72 < cf8aa9bf97cadf85745506c6a3e244b22c268d63
Linux / Linux
5.5
References
git.kernel.org: https://git.kernel.org/stable/c/012cdef22000f3104e4fa8224ad29fde509b8caf git.kernel.org: https://git.kernel.org/stable/c/a77141a06367825d639ac51b04703d551163e36c git.kernel.org: https://git.kernel.org/stable/c/07a96977b2f462337a9121302de64277b8747ab1 git.kernel.org: https://git.kernel.org/stable/c/cf8aa9bf97cadf85745506c6a3e244b22c268d63